Peer-to-Peer (P2P) applications, including both P2P streaming and P2P
|
|
- Philip Bailey
- 3 years ago
- Views:
From this document you will learn the answers to the following questions:
What do P2P caches often do?
What does the WG want to use open protocols to access in - network?
P2P applications can store and store what from inside the network?
Transcription
1 Description of Working Group Peer-to-Peer (P2P) applications, including both P2P streaming and P2P file-sharing applications, make up a large fraction of traffic in the Internet today. One way to reduce access network and/or cross-domain bandwidth usage by P2P applications is to introduce storage capabilities in the network between hosts running P2P applications. Allowing P2P applications to store and retrieve data from inside the network can reduce traffic on the last-mile uplink, as well as backbone and transit links. Existing P2P caches often implement the specific P2P application protocols to operate transparently or act as super peers to provide in-network storage. However, it is challenging for P2P cache vendors to support a variety of evolving protocols. Also, for P2P applications, closed P2P caching systems limit effective utilization of in-network storage. Some P2P protocols may be entirely unsupported by a particular caching system. Additionally, applications may be better-equipped to decide how in-network storage is used to meet their specific requirements (e.g., data placement, access control and resource control). Note that providers of in-network storage may impose their own access control or resource usage policies. Both of these challenges can be effectively addressed by using open, standard protocols to access in-network storage. P2P applications can store and retrieve content in the in-network storage, as well as control resources (e.g., bandwidth, connections) consumed by peers in a P2P application. As a simple example, a peer can choose to store content in the in-network storage, and direct other peers to retrieve from that location, reducing last-mile link usage. Furthermore, since a P2P client may have multiple peers, it can control resources used by each peer to store and retrieve content. Though there are existing data access protocols (e.g., HTTP, NFS, WebDAV), they might be
2 lacking capabilities for fine-grained access and resource control (e.g., bandwidth and connections) that are essential for today's advanced P2P applications. The Working Group (WG) has finished WGLC on the following three tasks, which documents are stabilized. First, the WG identifies target applications to appropriately scope the problem and requirements. P2P and other content distribution applications, like file sharing, file downloading and video streaming are the primary targets, but suitability to other applications with similar requirements may be considered depending on additional complexity required to support such applications. Second, the WG identifies the requirements to enable target applications to utilize in-network storage. Requirements included the ability for an application to (1) store, retrieve, and manage data, (2) indicate access control policies for storing and retrieving data suitable to an environment with users across multiple administrative and security domains (e.g., in a P2P environment), and (3) indicate resource control policies for storing and retrieving data. Third, the WG develops an architecture within which the DECADE protocol can be specified. This architecture identifies DECADE's relationship to existing IETF protocols and where (if any) new protocol(s) may be needed or extensions to existing protocols need to be made. The WG has the following tasks for the next step. Fourth, the WG will specify a standard resource control protocol between applications and in-network storage, and between in-network storage systems. The resource control protocol will define access control, resource sharing, and
3 content replication parameters for content delivery that will be implemented by the in-network storage. The resource control protocol will be based on existing IETF protocols that have seen wide deployment. Existing data transport protocols will be reused to store/retrieve/delete/replicate objects. The WG will identify a possibly minimum extension for carrying resource control parameters with these data transport protocols. One mandatory data transport protocol will be specified to improve interoperability. A minimum set of data and storage control attributes will be defined. Fifth, a discovery mechanism for user to locate the serving in-network storage node is required. One mandatory naming scheme is required for interoperability. Certain content de-duplication and security properties may be improved depending on the chosen naming scheme. A uniform naming scheme will be developed in this WG but the basic scheme will also be applicable to Websec and other WGs that have similar requirements. The WG will focus on the following work items: - A "problem statement" document. This document provides a description of the problem and common terminology. - A requirements document. This document lists the requirements for the in-network storage service (e.g., supported operations) and the protocol to support it. The service will include storing, retrieving, and managing data as well as specifying both access control and resource control policies in the in-network storage pertaining to that data.
4 - (finished) A survey document. This document will survey existing related mechanisms and protocols (e.g., HTTP, NFS, and WebDAV), and evaluate their applicability to DECADE. - An architecture document. This document will identify DECADE's relationship with existing IETF protocols. Existing protocols will be used wherever possible and appropriate to support DECADE's requirements. In particular, data storage, retrieval, and management may be provided by an existing IETF protocols. The WG will not limit itself to a single data transport protocol since different protocols may have varying implementation costs and performance tradeoffs. However, to keep interoperability manageable, a small number of specific, targeted, data transport protocols will be identified and used. -A protocol document. This document will specify the language between applications and in-network storage, and between in-network storage systems. This protocol will specify mechanisms for the accessing control and network resource control related to the particular content distribution, and a mandatory data transport protocol will be identified. -A discovery document. This document will specify the ways for applications to locate in-network storage node(s) to serve it. -A naming scheme document. The scheme may be useful in other WGs with similar requirements. - A document describing the integration of DECADE with existing content distribution applications (e.g., integration with BitTorrent). The following issues are considered out-of-scope for the WG:
5 - Specification of policies regarding copyright-protected or illegal content. - Locating the "best" in-network storage location from which to retrieve content if there are more than one location can provide the same content. This is assumed to be provided by ALTO. - Developing a new protocol for data transport between P2P applications and in-network storage. Goals and Milestones Done Working Group Last Call for Problem Statement Done Submit Problem Statement to IESG as Informational Done Working Group Last Call for Survey document Done Submit Survey document to IESG as Informational Done Working Group Last Call for Requirements document Done Working Group Last Call for Architecture document Nov 2011 Submit Requirements document to IESG as Informational Nov 2011 Submit Architecture document to IESG as Informational Mar 2011 Working Group Last Call for DECADE Integration Examples Apr 2012 Submit DECADE Integration Examples to IESG as Informational Nov 2012 Working Group Last Call for the DECADE Discovery Nov 2012 Working Group Last Call for DECADE protocol Nov 2012 Working Group Last Call for the naming scheme Mar 2013 Submit DECADE Discovery to IESG as Informational Mar 2013 Submit DECADE Protocol to IESG as Proposed Standard Mar 2013 Submit the naming scheme to IESG as Proposed Standard
SDN Testbed Experiences: Challenges and Next Steps
SDN Testbed Experiences: Challenges and Next Steps SDN Concertation Workshop January 30 th, 2014 Daniel King d.king@lancaster.ac.uk Panagiotis Georgopoulos p.georgopoulos@lancaster.ac.uk Nicholas Race
More informationAnalysis of traffic demographics in Broadband networks
White paper Analysis of traffic demographics in Broadband networks Table of Contents Background...1 Aggregate Traffic Trends...1 Upstream Traffic Trends...2 Downstream Traffic Trends...3 Summary...4 www.sandvine.com
More informationMulticast vs. P2P for content distribution
Multicast vs. P2P for content distribution Abstract Many different service architectures, ranging from centralized client-server to fully distributed are available in today s world for Content Distribution
More informationImproving Deployability of Peer-assisted CDN Platform with Incentive
Improving Deployability of Peer-assisted CDN Platform with Incentive GLOBECOM 2009 Dec 2, 2009 Tatsuya Mori, Noriaki Kamiyama, Shigeaki Harada, Haruhisa Hasegawa, and Ryoichi Kawahara NTT Service Integration
More informationDeployment considerations draft-ietf-alto-deployments-08
Deployment considerations draft-ietf-alto-deployments-08 Martin Stiemerling, Sebastian Kiesel, Stefano Previdi, Michael Scharf Presented by Vijay Gurbani IETF 88, Vancouver, Canada, Nov. 2013 Status of
More informationInformation-Centric Networking: Introduction and Key Issues
UCL DEPARTMENT OF ELECTRONIC AND ELECTRICAL ENGINEERING COMMUNICATIONS AND INFORMATION SYSTEMS GROUP ICN Session FIA Budapest Information-Centric Networking: Introduction and Key Issues Prof. George Pavlou
More informationDESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
More informationExpires: September 15, 2011 X. Chen HUAWEI Technologies March 14, 2011
DECADE Internet-Draft Intended status: Informational Expires: September 15, 2011 L. Chen H. Liu Yale University Z. Huang X. Chen HUAWEI Technologies March 14, 2011 Integration Examples of DECADE System
More informationThe Role and uses of Peer-to-Peer in file-sharing. Computer Communication & Distributed Systems EDA 390
The Role and uses of Peer-to-Peer in file-sharing Computer Communication & Distributed Systems EDA 390 Jenny Bengtsson Prarthanaa Khokar jenben@dtek.chalmers.se prarthan@dtek.chalmers.se Gothenburg, May
More informationSeptember 2009 Cloud Storage for Cloud Computing
September 2009 Cloud Storage for Cloud Computing This paper is a joint production of the Storage Networking Industry Association and the Open Grid Forum. Copyright 2009 Open Grid Forum, Copyright 2009
More informationCharter Text Network Design and Configuration
MIF Charter update proposal MIF WG Charter update proposal summary http://www.ietf.org/mail-archive/web/mif/current/msg02125.html Specific deliverables listed MPVD architecture document Requirement for
More information3. Some of the technical measures presently under consideration are methods of traffic shaping, namely bandwidth capping and bandwidth shaping 2.
THE IDENTIFIED EMERGING POLICY RESPONSES 1. INSERT Traffic shaping 2. The UK Parliament is presently considering introducing technical measures to tackle the problem of unlawful peer-to-peer (P2P) file-sharing.
More informationA Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands l.dacunto@tudelft.nl
More informationInternet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, yhe@ee.ryerson.ca Ling Guan, lguan@ee.ryerson.ca 1 Outline Internet video streaming Overview Video coding Approaches for video
More informationIntegrated Approach to Network Security. Lee Klarich Senior Vice President, Product Management March 2013
Integrated Approach to Network Security Lee Klarich Senior Vice President, Product Management March 2013 Real data from actual networks 2 2012, Palo Alto Networks. Confidential and Proprietary. 2008: HTTP,
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationCHAPTER 7 SUMMARY AND CONCLUSION
179 CHAPTER 7 SUMMARY AND CONCLUSION This chapter summarizes our research achievements and conclude this thesis with discussions and interesting avenues for future exploration. The thesis describes a novel
More informationNetwork Positioning System
Network Positioning System How service provider infrastructure can support rapid growth of video, cloud and application traffic Stefano Previdi sprevidi@cisco.com Distinguished Engineer Cisco Systems 1
More informationCisco WAAS 4.4.1 Context-Aware DRE, the Adaptive Cache Architecture
White Paper Cisco WAAS 4.4.1 Context-Aware DRE, the Adaptive Cache Architecture What You Will Learn Enterprises face numerous challenges in the delivery of applications and critical business data to the
More informationDelft University of Technology Parallel and Distributed Systems Report Series. The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis
Delft University of Technology Parallel and Distributed Systems Report Series The Peer-to-Peer Trace Archive: Design and Comparative Trace Analysis Boxun Zhang, Alexandru Iosup, and Dick Epema {B.Zhang,A.Iosup,D.H.J.Epema}@tudelft.nl
More informationTesting & Assuring Mobile End User Experience Before Production. Neotys
Testing & Assuring Mobile End User Experience Before Production Neotys Agenda Introduction The challenges Best practices NeoLoad mobile capabilities Mobile devices are used more and more At Home In 2014,
More informationFortiGate UTM. Daily Activity Report. Nov 11, 2015 00:02:21. FortiGate Host Name: FG300C3913600056. FortiGate Serial Number: FG300C3913600056
FortiGate UTM Daily Activity Report Nov 11, 2015 00:02:21 FortiGate Host Name: FG300C3913600056 FortiGate Serial Number: FG300C3913600056 10-Nov-2015 00:00 To 10-Nov-2015 23:59 2 Table of Contents Bandwidth
More informationFAQs for Oracle iplanet Proxy Server 4.0
FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle
More informationExecutive Brief for Sharing Sites & Digital Content Providers. Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits
Executive Brief for Sharing Sites & Digital Content Providers Leveraging Hybrid P2P Technology to Enhance the Customer Experience and Grow Profits Executive Summary The Opportunity/Challenge The revenue
More informationThe Effect of Caches for Mobile Broadband Internet Access
The Effect of s for Mobile Jochen Eisl, Nokia Siemens Networks, Munich, Germany Haßlinger, Deutsche Telekom Technik,, Darmstadt, Germany IP-based content delivery: CDN & cache architecture Impact of access
More informationCISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR
PERFORMANCE BRIEF CISCO WIDE AREA APPLICATION SERVICES (WAAS) OPTIMIZATIONS FOR EMC AVAMAR INTRODUCTION Enterprise organizations face numerous challenges when delivering applications and protecting critical
More informationNovel Systems. Extensible Networks
Novel Systems Active Networks Denali Extensible Networks Observations Creating/disseminating standards hard Prototyping/research Incremental deployment Computation may be cheap compared to communication
More informationExperiment of network services invocation in the Orange testbed The CINA interface
Experiment of network services invocation in the Orange testbed The CINA interface Bertrand Mathieu, Irène Grosclaude, Pierre Paris Orange Labs bertrand2.mathieu@orange.com Workshop «Optimisation of Network
More informationHorizontal IoT Application Development using Semantic Web Technologies
Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges
More informationInternet Content Distribution
Internet Content Distribution Chapter 4: Content Distribution Networks (TUD Student Use Only) Chapter Outline Basics of content distribution networks (CDN) Why CDN? How do they work? Client redirection
More informationIntroduction to UDDI: Important Features and Functional Concepts
: October 2004 Organization for the Advancement of Structured Information Standards www.oasis-open.org TABLE OF CONTENTS OVERVIEW... 4 TYPICAL APPLICATIONS OF A UDDI REGISTRY... 4 A BRIEF HISTORY OF UDDI...
More informationTowards a Peer-to-Peer Extended Content Delivery Network
Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi
More information3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany
3GPP TSG SA WG3 Security S3#25 S3-020572 8-11 October 2002 Munich, Germany Title: Response to: Source: To: Cc: Liaison on HTTP Security investigation within IMS LS S3-020475 (S2-022609) on Liaison on Security
More informationControlling which applications can access network resources and the Internet
Controlling which applications can access network resources and the Internet In this example, you will learn how to use Application Control to monitor traffic and determine if there are any applications
More informationFull Digital Contents Distribution to the Home using IPv6
Full Digital Contents Distribution to the Home using IPv6 14 th Mar 2002 Munechika Sumikawa (sumikawa@ebina.hitachi.co.jp) Enterprise Server Division Hitachi, Ltd. 1 Goals: Introduction Explain key benefits
More informationBroadband Service Architecture for Access to Legacy Data Networks over ADSL Issue 1
Technical Report TR-012 Broadband Service Architecture for Access to Legacy Data s over ADSL Issue 1 June 1998 Abstract: This Technical Report specifies an interoperable end-to-end architecture to support
More informationHW2 Grade. CS585: Applications. Traditional Applications SMTP SMTP HTTP 11/10/2009
HW2 Grade 70 60 CS585: Applications 50 40 30 20 0 0 2 3 4 5 6 7 8 9 0234567892022223242526272829303323334353637383940442 CS585\CS485\ECE440 Fall 2009 Traditional Applications SMTP Simple Mail Transfer
More informationManaging the growth of video over IP
Managing content for revenue Managing the growth of video over IP The media-content equation contains three parameters: content consumers, content providers and content delivery. All three elements affect
More informationThe Challenges of Stopping Illegal Peer-to-Peer File Sharing
The Challenges of Stopping Illegal Peer-to-Peer File Sharing Kevin Bauer Dirk Grunwald Douglas Sicker Department of Computer Science University of Colorado Context: The Rise of Peer-to-Peer 1993-2000:
More informationHow To Improve Interconnection
the Internet is for everyone An Introduction to Internet Interconnection Concepts and Actors Briefing Paper An Introduction to Internet Interconnection Concepts and Actors Introduction The Internet is
More informationTOPOLOGIES NETWORK SECURITY SERVICES
TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security
More informationWanVelocity. WAN Optimization & Acceleration
WanVelocity D A T A S H E E T WAN Optimization & Acceleration WanVelocity significantly accelerates applications while reducing bandwidth costs using a combination of application acceleration, network
More informationBrazil CONTRIBUTION TO THE SIXTH MEETING OF CWG-INTERNET
COUNCIL WORKING GROUP ON INTERNATIONAL INTERNET-RELATED PUBLIC POLICY ISSUES (RES. 1336) 6 th meeting, Geneva, 2-3 February 2015 INTERNATIONAL TELECOMMUNICATION UNION Document CWG-Internet 6/4-E 15 September
More informationITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services
ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services How can an ISP merge with a CDN? Kideok Cho, Hakyung Jung, Munyoung Lee, Diko Ko, Ted Taekyoung Kwon, and Yanghee
More informationCDN and Traffic-structure
CDN and Traffic-structure Outline Basics CDN Traffic Analysis 2 Outline Basics CDN Building Blocks Services Evolution Traffic Analysis 3 A Centralized Web! Slow content must traverse multiple backbones
More informationLab Testing Summary Report
Lab Testing Summary Report September 2007 Report 070914 Product Category: WAN Optimization Vendor Tested: Packeteer, Inc. Product Tested: ishaper 400 Key findings and conclusions: Deep packet inspection
More informationMOBILE VIDEO WITH MOBILE IPv6
MOBILE VIDEO WITH MOBILE IPv6 DANIEL MINOLI WILEY A JOHN WILEY & SONS, INC., PUBLICATION CONTENTS PREFACE ABOUT THE AUTHOR xi xiii 1 THE MOBILE USER ENVIRONMENT: SMART PHONES, PORTABLE MEDIA PLAYERS (PMPs),
More informationA Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
More informationEfficient Data Management Support for Virtualized Service Providers
Efficient Data Management Support for Virtualized Service Providers Íñigo Goiri, Ferran Julià and Jordi Guitart Barcelona Supercomputing Center - Technical University of Catalonia Jordi Girona 31, 834
More informationMetroNet6 - Homeland Security IPv6 R&D over Wireless
MetroNet6 - Homeland Security IPv6 R&D over Wireless By: George Usi, President, Sacramento Technology Group and Project Manager, California IPv6 Task Force gusi@sactechgroup.com Acknowledgement Reference:
More informationTowards Peer-to-Peer Long-Lived Mobile Web Services
Towards Peer-to-Peer Long-Lived Mobile s Fahad Aijaz, Bilal Hameed, Bernhard Walke RWTH Aachen University, Faculty 6 Communication Networks Kopernikusstr. 16, 52074 Aachen {fah, bhd}@comnets.rwth-aachen.de
More informationP2P VoIP for Today s Premium Voice Service 1
1 P2P VoIP for Today s Premium Voice Service 1 Ayaskant Rath, Stevan Leiden, Yong Liu, Shivendra S. Panwar, Keith W. Ross ARath01@students.poly.edu, {YongLiu, Panwar, Ross}@poly.edu, Steve.Leiden@verizon.com
More informationYouServ: A Web Hosting and Content Sharing Tool for the Masses
YouServ: A Web Hosting and Content Sharing Tool for the Masses Roberto Bayardo IBM Almaden Research Center Joint work with Rakesh Agrawal, Daniel Gruhl, and Amit Somani Goal Allow people to easily share
More informationNet Neutrality and the Open Internet: The Consumer Perspective
Presentation Net Neutrality and the Open Internet: The Consumer Perspective UK market and regulatory context 7 th October 2010 Net Neutrality and Traffic Management Net neutrality is about whether and
More informationA Comparison of Mobile Peer-to-peer File-sharing Clients
1. ABSTRACT A Comparison of Mobile Peer-to-peer File-sharing Clients Imre Kelényi 1, Péter Ekler 1, Bertalan Forstner 2 PHD Students 1, Assistant Professor 2 Budapest University of Technology and Economics
More informationPeer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol
Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška
More informationOVERVIEW OF ALL VOIP SOLUTIONS
OVERVIEW OF ALL VOIP SOLUTIONS Kovács Gábor Parnaki Zsolt Gergı 13/03/2009 TABLE OF CONTENTS Introduction Overview of VoIP protocols Standard based implementations: H.323 SIP Proprietary solutions: Skype
More informationTowards Cloud Streaming: architecture, mechanism and deployments
outline Towards Cloud Streaming: architecture, mechanism and deployments IETF-78, Clouds bar BoF, July 2010 Xiaogang Wei (arojoy@forcetech.net) Lisa Dewar (lisamariedewar@googlemail.com) About ForceTech
More informationAUTOMATED AND ADAPTIVE DOWNLOAD SERVICE USING P2P APPROACH IN CLOUD
IMPACT: International Journal of Research in Engineering & Technology (IMPACT: IJRET) ISSN(E): 2321-8843; ISSN(P): 2347-4599 Vol. 2, Issue 4, Apr 2014, 63-68 Impact Journals AUTOMATED AND ADAPTIVE DOWNLOAD
More informationNetwork Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
More informationSysAid Remote Discovery Tool
SysAid Remote Discovery Tool SysAid Release 7 Document Updated: 27-Apr-10 SysAid Remote Discovery Tool The SysAid server comes with a built-in discovery service that performs various network discovery
More informationMDM and Telco Service Development OMA Device Management and Platforms
MDM and Telco Service Development OMA Device Management and Platforms Berlin, 21 September 2010 Friedhelm Rodermund, Vice-Chair, Device Management Working Group, OMA www.openmobilealliance.org Agenda Overview
More informationSHared Access Research Ecosystem (SHARE)
SHared Access Research Ecosystem (SHARE) June 7, 2013 DRAFT Association of American Universities (AAU) Association of Public and Land-grant Universities (APLU) Association of Research Libraries (ARL) This
More informationbcp for a large scale carrier level VoIP system
bcp for a large scale carrier level VoIP system using p2psip draft zhang p2psip bcp 04 Yunfei.Zhang Gang.Li Jin.Peng Baohong.He Shihui.Duan Wei.Zhu {zhangyunfei,ligangyf,pengjin}@chinamobile.com {hebaohong,duanshihui,zhuwei}@catr.cn
More informationWAN Optimization Solutions Bring Web 2.0 to the Classroom and Control P2P Traffic
WAN Optimization Solutions Bring Web 2.0 to the Classroom and Control P2P Traffic Presenter: Con Nikolouzakis, Chief Product Officer Overview Company founded in 2002 Education Customers (ANZ) Develop WAN
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for Service Providers FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or
More informationGLIF End to end architecture Green paper
GLIF End to end architecture Green paper Bill, Inder, Erik-Jan GLIF Tech Honolulu, HI, USA 17 Jan 2013 Green Paper EC uses the concept of a green paper: A green paper released by the European Commission
More informationMail Archive and informal PPVPN server
Chair(s): Rick Wilder rwilder@masergy.com Mailing List Marco Carugi marco.carugi@francetelecom.com Discussion: ppvpn@ppvpn.francetelecom.com (Un)Subscribe: sympa@ppvpn.francetelecom.com (UN)SUBSCRIBE ppvpn
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationDecentralized Peer-to-Peer Network Architecture: Gnutella and Freenet
Decentralized Peer-to-Peer Network Architecture: Gnutella and Freenet AUTHOR: Jem E. Berkes umberkes@cc.umanitoba.ca University of Manitoba Winnipeg, Manitoba Canada April 9, 2003 Introduction Although
More informationApp coverage. ericsson White paper Uen 284 23-3212 Rev B August 2015
ericsson White paper Uen 284 23-3212 Rev B August 2015 App coverage effectively relating network performance to user experience Mobile broadband networks, smart devices and apps bring significant benefits
More informationPeer to Peer File Sharing and Copyright Infringement Policy
Peer to Peer File Sharing and Copyright Infringement Policy Overview The abuse of network resources to illegally obtain and distribute media or software, through peer to peer (P2P) networks, or direct
More informationIndirection. science can be solved by adding another level of indirection" -- Butler Lampson. "Every problem in computer
Indirection Indirection: rather than reference an entity directly, reference it ( indirectly ) via another entity, which in turn can or will access the original entity A x B "Every problem in computer
More informationPeer-to-Peer Networks. Chapter 2: Initial (real world) systems Thorsten Strufe
Chapter 2: Initial (real world) systems Thorsten Strufe 1 Chapter Outline Overview of (previously) deployed P2P systems in 3 areas P2P file sharing and content distribution: Napster, Gnutella, KaZaA, BitTorrent
More informationENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES
ENABLING SEMANTIC SEARCH IN STRUCTURED P2P NETWORKS VIA DISTRIBUTED DATABASES AND WEB SERVICES Maria Teresa Andrade FEUP / INESC Porto mandrade@fe.up.pt ; maria.andrade@inescporto.pt http://www.fe.up.pt/~mandrade/
More informationThe OSI & Internet layering models
CSE 123 Computer Networks Fall 2009 Lecture 2: Protocols & Layering Today What s a protocol? Organizing protocols via layering Encoding layers in packets The OSI & Internet layering models The end-to-end
More informationCloud Gateway. Agenda. Cloud concepts Gateway concepts My work. Monica Stebbins
Approved for Public Release; Distribution Unlimited. Case Number 15 0196 Cloud Gateway Monica Stebbins Agenda 2 Cloud concepts Gateway concepts My work 3 Cloud concepts What is Cloud 4 Similar to hosted
More informationUsing Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER
Using Steelhead Appliances and Stingray Aptimizer to Accelerate Microsoft SharePoint WHITE PAPER Introduction to Faster Loading Web Sites A faster loading web site or intranet provides users with a more
More informationHow To Understand The Power Of A Content Delivery Network (Cdn)
Overview 5-44 5-44 Computer Networking 5-64 Lecture 8: Delivering Content Content Delivery Networks Peter Steenkiste Fall 04 www.cs.cmu.edu/~prs/5-44-f4 Web Consistent hashing Peer-to-peer CDN Motivation
More informationStorage Multi-Tenancy for Cloud Computing. Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member
Paul Feresten, NetApp; SNIA Cloud Storage Initiative Member March, 2010 Table of Contents Introduction...1 What is Multi-Tenancy?...2 Storage Multi-Tenancy...2 Enabling Cloud-Based Data Management CDMI...3
More informationNetwork Assessment Services
Network ment Services Information networks are arguably your most important IT assets, their speed and reliability are the foundations upon which your critical business systems and applications run. Ensuring
More informationEnhanced Transmission Selection
Enhanced Transmission Selection Background Priorities/classes are being used to separate traffic with different QOS characteristics It is desirable to enable sharing network bandwidth between classes For
More informationIP Multicast Backgrounder An IP Multicast Initiative White Paper
Stardust Technologies, Inc 1901 S. Bascom Ave, #333 Campbell, CA 95008 USA Tel: 408-879-8080 Fax: 408-879-8081 Web: www.ipmulticast.com IP Multicast Initiative (IPMI) IP Multicast Backgrounder An IP Multicast
More informationLecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
More informationFRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com
WebRTC for the Enterprise FRAFOS GmbH FRAFOS GmbH Windscheidstr. 18 Ahoi 10627 Berlin Germany info@frafos.com www.frafos.com This document is copyright of FRAFOS GmbH. Duplication or propagation or extracts
More informationNetwork Architecture and Topology
1. Introduction 2. Fundamentals and design principles 3. Network architecture and topology 4. Network control and signalling 5. Network components 5.1 links 5.2 switches and routers 6. End systems 7. End-to-end
More informationUnit title: Network Infrastructure 2: Planning and Maintenance
Higher National Unit Specification General information for centres Unit code: DG00 35 Unit purpose: This Unit is designed to introduce candidates to the issues involved in planning and maintaining a network
More informationAdaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011
W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in
More informationBandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
More informationCHAPTER 1 INTRODUCTION
CHAPTER 1 INTRODUCTION 1.1 Introduction Service Discovery Protocols (SDPs) are network protocols which allow automatic detection of devices and services offered by these devices on a computer network [1].
More informationGlobule: a Platform for Self-Replicating Web Documents
Globule: a Platform for Self-Replicating Web Documents Guillaume Pierre Maarten van Steen Vrije Universiteit, Amsterdam Internal report IR-483 January 2001 Abstract Replicating Web documents at a worldwide
More informationSystem Models for Distributed and Cloud Computing
System Models for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Classification of Distributed Computing Systems
More informationThree short case studies
Three short case studies peer to peer networking wireless systems search engines each includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs.
More informationUnit 3 - Advanced Internet Architectures
Unit 3 - Advanced Internet Architectures Carlos Borrego Iglesias, Sergi Robles Carlos.Borrego@uab.cat,Sergi.Robles@uab.cat Departament d Enginyeria de la Informació i de les Comunicacions Universitat Autònoma
More informationArchitectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices
Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope
More informationThe Ultimate Guide to Gaining Control of the WAN
LAYLAND CONSULTING The Ultimate Guide to Gaining Control of the WAN A TechTarget Document Robin Layland November 2009 The e-book, The Ultimate Guide to Gaining Control of the WAN, explains the drivers
More informationThe old Internet. Software in the Network: Outline. Traditional Design. 1) Basic Caching. The Arrival of Software (in the network)
The old Software in the Network: What Happened and Where to Go Prof. Eric A. Brewer UC Berkeley Inktomi Corporation Local networks with local names and switches IP creates global namespace and links the
More informationStudy of Flexible Contents Delivery System. With Dynamic Server Deployment
Study of Flexible Contents Delivery System With Dynamic Server Deployment Yuko KAMIYA Toshihiko SHIMOKAWA and orihiko YOSHIDA Graduate School of Information Science, Kyushu Sangyo University, JAPA Faculty
More informationOn the Penetration of Business Networks by P2P File Sharing
On the Penetration of Business Networks by P2P File Sharing Kevin Lee School of Computer Science, University of Manchester, Manchester, UK. +44 () 161 2756132 klee@cs.man.ac.uk Danny Hughes Computing,
More informationTop-Down Network Design
Top-Down Network Design Chapter Four Characterizing Network Traffic Copyright 2010 Cisco Press & Priscilla Oppenheimer Network Traffic Factors Traffic flow unidirectional, bidirectional symmetric, asymmetric
More information